summaryrefslogtreecommitdiff
path: root/oauthlib/oauth1/rfc5849/endpoints/request_token.py
diff options
context:
space:
mode:
Diffstat (limited to 'oauthlib/oauth1/rfc5849/endpoints/request_token.py')
-rw-r--r--oauthlib/oauth1/rfc5849/endpoints/request_token.py19
1 files changed, 10 insertions, 9 deletions
diff --git a/oauthlib/oauth1/rfc5849/endpoints/request_token.py b/oauthlib/oauth1/rfc5849/endpoints/request_token.py
index 9424b9d..e97c34b 100644
--- a/oauthlib/oauth1/rfc5849/endpoints/request_token.py
+++ b/oauthlib/oauth1/rfc5849/endpoints/request_token.py
@@ -21,6 +21,7 @@ log = logging.getLogger(__name__)
class RequestTokenEndpoint(BaseEndpoint):
+
"""An endpoint responsible for providing OAuth 1 request tokens.
Typical use is to instantiate with a request validator and invoke the
@@ -47,7 +48,7 @@ class RequestTokenEndpoint(BaseEndpoint):
return urlencode(token.items())
def create_request_token_response(self, uri, http_method='GET', body=None,
- headers=None, credentials=None):
+ headers=None, credentials=None):
"""Create a request token response, with a new request token if valid.
:param uri: The full URI of the token request.
@@ -98,7 +99,7 @@ class RequestTokenEndpoint(BaseEndpoint):
try:
request = self._create_request(uri, http_method, body, headers)
valid, processed_request = self.validate_request_token_request(
- request)
+ request)
if valid:
token = self.create_request_token(request, credentials or {})
return resp_headers, token, 200
@@ -123,15 +124,15 @@ class RequestTokenEndpoint(BaseEndpoint):
request.realms = request.realm.split(' ')
else:
request.realms = self.request_validator.get_default_realms(
- request.client_key, request)
+ request.client_key, request)
if not self.request_validator.check_realms(request.realms):
raise errors.InvalidRequestError(
- description='Invalid realm %s. Allowed are %r.' % (
- request.realms, self.request_validator.realms))
+ description='Invalid realm %s. Allowed are %r.' % (
+ request.realms, self.request_validator.realms))
if not request.redirect_uri:
raise errors.InvalidRequestError(
- description='Missing callback URI.')
+ description='Missing callback URI.')
if not self.request_validator.validate_timestamp_and_nonce(
request.client_key, request.timestamp, request.nonce, request,
@@ -146,7 +147,7 @@ class RequestTokenEndpoint(BaseEndpoint):
#
# Note that early exit would enable client enumeration
valid_client = self.request_validator.validate_client_key(
- request.client_key, request)
+ request.client_key, request)
if not valid_client:
request.client_key = self.request_validator.dummy_client
@@ -173,13 +174,13 @@ class RequestTokenEndpoint(BaseEndpoint):
# that the realm is now tied to the access token and not provided by
# the client.
valid_realm = self.request_validator.validate_requested_realms(
- request.client_key, request.realms, request)
+ request.client_key, request.realms, request)
# Callback is normally never required, except for requests for
# a Temporary Credential as described in `Section 2.1`_
# .._`Section 2.1`: http://tools.ietf.org/html/rfc5849#section-2.1
valid_redirect = self.request_validator.validate_redirect_uri(
- request.client_key, request.redirect_uri, request)
+ request.client_key, request.redirect_uri, request)
if not request.redirect_uri:
raise NotImplementedError('Redirect URI must either be provided '
'or set to a default during validation.')